1. uri8472's Avatar
    Thats why i have 4 emails. All incrementally important.
    1 Bank
    2 School and work and some online shopping
    3 Personal and more online shopping
    4 Anything thats probably spam
    All different passwords that have never been written (or typed) that i will never forget
    And of course good security questions and answers
    This isn't a bad approach, indeed, but it wouldn't have made a difference in this case, as the attacks went after the specific email address used as the victim's Apple ID. Frankly, I find it both shocking and disturbing that Apple has made it this easy to every system someone owns (under the same Apple ID.) Wiping a system should require an additional step, if not a password, then at least a pass-code not unlike what you use to unlock an iOS device; this feature shouldn't be invokable with just the Apple ID password --- using blanket security measures for high security elements always tends to lead to problems like this and Apple really should have known better.
    Last edited by uri8472; 2012-08-06 at 09:26 PM.
    2012-08-06 09:09 PM
  2. bry2k2's Avatar
    Apple's new slogan should be, "Helping hackers destroy your life"
    2012-08-07 03:16 AM
  3. Mrteacup's Avatar
    Umm you realize the problem is that Apple products just seem more secure because they aren't a highly targeted OS right now because not everyone has one but that's changing my friend and btw I'm far away from being naive.
    The reason they are more secure is cause they aren't open source like androids. It doesn't have to do with targeting because look theirs a whole jb community that has already targeted hacking iPhones. Also saying not everyone has an iPhone proves how naive you are. iPhone's are the most popular single phone. Android is more popular but it's the software on all phones the droid x and Samsung galaxy 3 aren't nearly as popular as the iPhone.
    2012-08-07 05:19 AM
  4. raduga's Avatar
    The reason they are more secure is cause they aren't open source like androids. It doesn't have to do with targeting because look theirs a whole jb community that has already targeted hacking iPhones. Also saying not everyone has an iPhone proves how naive you are. iPhone's are the most popular single phone. Android is more popular but it's the software on all phones the droid x and Samsung galaxy 3 aren't nearly as popular as the iPhone.
    Wow,
    I guess Windows must be way more secure than Macs, iPhones or Android phones then.
    2012-08-07 09:58 AM
  5. Dark_Ninja's Avatar
    The reason they are more secure is cause they aren't open source like androids. It doesn't have to do with targeting because look theirs a whole jb community that has already targeted hacking iPhones. Also saying not everyone has an iPhone proves how naive you are. iPhone's are the most popular single phone. Android is more popular but it's the software on all phones the droid x and Samsung galaxy 3 aren't nearly as popular as the iPhone.
    Has nothing to do with being open source dude. And I never once said iPhones aren't the most popular. They are trust me I know this cuz I see 5 year old kids all the way up to older folks with iPhones. Which means that apple products will start becoming the victim of more and more malicious attacks
    http://www.vicrosdesigns.net/imgs/DNsigv3.png
    2012-08-07 01:20 PM
  6. H4CK3R's Avatar
    It's funny to see how good these hackers are, yet how much they abuse it. I'm all for hacking and social engineering, but when they go ahead and erase the guys stuff, that's just gone too far. It puts a bad image on the whole hacking/social engineering community.
    2012-08-07 01:21 PM
  7. Gamemaster77's Avatar
    It's funny to see how good these hackers are, yet how much they abuse it. I'm all for hacking and social engineering, but when they go ahead and erase the guys stuff, that's just gone too far. It puts a bad image on the whole hacking/social engineering community.
    Yep, I'm fine with a little fun and games. But when people actually do that kind of damage, it's gone too far.
    2012-08-07 11:10 PM
  8. szr's Avatar
    It's funny to see how good these hackers are, yet how much they abuse it. I'm all for hacking and social engineering, but when they go ahead and erase the guys stuff, that's just gone too far. It puts a bad image on the whole hacking/social engineering community.
    You have no problem with social engineering? That is, "obtaining information by manipulating and/or deceiving people", as it's defined as, which is exactly what the article was about. Do you really think you should be treating the ability of acquiring someone's account information by lying to a tech support agent so lightly?
    2012-08-11 04:50 PM
  9. H4CK3R's Avatar
    As Gamemaster mentioned earlier, it's fine for fun and games, but not for damage.
    2012-08-11 05:44 PM
  10. szr's Avatar
    As Gamemaster mentioned earlier, it's fine for fun and games, but not for damage.
    Care to give an example?
    2012-08-11 07:29 PM
  11. H4CK3R's Avatar
    Convince your friend to give their iDevice to you and claim you'll jailbreak it. Jailbreak it and then use SBSettings or Springtomize to make all the icons hidden. Their reaction = Priceless.
    2012-08-11 08:08 PM
  12. mmaboi21's Avatar
    Convince your friend to give their iDevice to you and claim you'll jailbreak it. Jailbreak it and then use SBSettings or Springtomize to make all the icons hidden. Their reaction = Priceless.
    Nicely said my friend I have to try that
    2012-08-12 12:34 AM
  13. H4CK3R's Avatar
    Nicely said my friend I have to try that
    Tell me your friends reaction if you do
    2012-08-12 12:53 AM
  14. mmaboi21's Avatar
    Will do
    2012-08-12 02:30 AM
  15. znbl's Avatar
    Convince your friend to give their iDevice to you and claim you'll jailbreak it. Jailbreak it and then use SBSettings or Springtomize to make all the icons hidden. Their reaction = Priceless.
    Um, that's we call a prank. Which is a far cry from real social engineering, where you coerce some hapless tech support rep into giving access to personal information.
    2012-08-12 03:00 AM
  16. mmaboi21's Avatar
    Oh no, the TECHNICAL police are in the building...
    2012-08-12 03:02 AM
  17. H4CK3R's Avatar
    Um, that's we call a prank. Which is a far cry from real social engineering, where you coerce some hapless tech support rep into giving access to personal information.
    It's still social engineering. You CONVINCED them into giving you the device, they didn't give it to you. This applies to this article as well, they convinced tech support into bypassing the security questions.

    mmaboi we better take cover before they try and arrest us
    2012-08-12 03:22 AM
  18. mmaboi21's Avatar
    That is not my name, I don't know who you are referring to...

    😉
    2012-08-12 03:50 AM
  19. H4CK3R's Avatar
    Can't see those on a PC lmao. -_-
    2012-08-12 04:40 AM
  20. mmaboi21's Avatar
    My fault
    Here ya go
    2012-08-12 05:56 AM
42 123
LINK TO POST COPIED TO CLIPBOARD